Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Report: ISIS Using Snowden Documents to Evade U.S. Intel Efforts
Free Beacon ^ | July 21, 2015 | Lachlan Markey

Posted on 07/21/2015 11:17:56 AM PDT by lbryce

The self-proclaimed Islamic State has used National Security Agency documents stolen by former contractor Edward Snowden to evade U.S. intelligence services, officials told the New York Times in a Tuesday story.

The Times reported that fact deep in a story on the group’s efforts to evade and recover from American and Iraqi military strikes.

Documents stolen and leaked to reporters by Snowden, who remains in hiding in Russia, have led to changes in IS operations that have prevented U.S. forces from gathering intelligence on the group, the Times reported.

The Islamic State has also studied revelations from Edward J. Snowden, the former National Security Agency contractor, about how the United States gathers information on militants. A main result is that the group’s top leaders now use couriers or encrypted channels that Western analysts cannot crack to communicate, intelligence and military officials said.

(Excerpt) Read more at freebeacon.com ...


TOPICS: Extended News; Government; News/Current Events; Russia
KEYWORDS: edwardsnowden; iran; isis; isissnowden; lebanon; russia; sleepercell; snowden; snowdendocs; traitor; treason
Navigation: use the links below to view more comments.
first previous 1-2021-26 last
To: lbryce
 photo 87c80b03-5d20-49dc-9f0a-bcdc20eafdd5_zpso17wqflr.jpg
21 posted on 07/21/2015 6:13:19 PM PDT by timestax (American Media = Domestic Enemy)
[ Post Reply | Private Reply | To 1 | View Replies]

To: lbryce; SunkenCiv

Moscow would sacrifice Snowden to protect their actual moles

http://20committee.com/2015/07/19/the-painful-truth-about-snowden/


22 posted on 07/21/2015 10:14:01 PM PDT by AdmSmith (GCTGATATGTCTATGATTACTCAT)
[ Post Reply | Private Reply | To 1 | View Replies]

To: AdmSmith

My best guess is, Snowden was recruited and groomed while still in high school.


23 posted on 07/22/2015 12:37:46 AM PDT by SunkenCiv (What do we want? REGIME CHANGE! When do we want it? NOW)
[ Post Reply | Private Reply | To 22 | View Replies]

To: SunkenCiv

Any idea about his FR name?


24 posted on 07/22/2015 7:01:50 AM PDT by AdmSmith (GCTGATATGTCTATGATTACTCAT)
[ Post Reply | Private Reply | To 23 | View Replies]

To: cynwoody
I presume this is a program or an app, but I don't recognize the language nor do I have a compiler.
25 posted on 07/26/2015 5:14:04 AM PDT by JoeFromSidney ( book, RESISTANCE TO TYRANNY, available from Amazon)
[ Post Reply | Private Reply | To 18 | View Replies]

To: JoeFromSidney
/dev/random is an example of a facility to provide true randomness (entropy) extracted from a system's environment. E.g., whenever a keyboard or mouse event or network packet arrives, grab the least significant bit of the timestamp counter and add it to the entry pool. In extreme cases, hardware may be used to, for example, digitize thermal noise. Bits from the entropy pool are then used to seed cryptographic PRNGs to provide such things as TLS session keys.
26 posted on 07/26/2015 1:33:14 PM PDT by cynwoody
[ Post Reply | Private Reply | To 25 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-26 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson